100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Ethical Hacker Pro Test Questions and Correct Answers $8.49   Add to cart

Exam (elaborations)

Ethical Hacker Pro Test Questions and Correct Answers

 0 view  0 purchase
  • Course
  • Ethical Hacking
  • Institution
  • Ethical Hacking

Ethical hacking Perpetrating exploits against a system with the intent to find vulnerabilities so that security weaknesses can be addressed and the system can be made more secure. Penetration testing The practice of finding vulnerabilities and risks with the purpose of securing the computer or net...

[Show more]

Preview 2 out of 9  pages

  • September 23, 2024
  • 9
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
twishfrancis
Ethical Hacking Study Guide with
Questions and Correct Answers
Which of the following is not a step of the attack lifecycle? ✅External Recon

Which of the following is a collection of software tools that gives a
threat actor remote access to and control over a computer or other system? ✅Rootkit

In ethical hacking, is the process of identifying information about the target before
attacking. ✅reconnaissance

Which of the following hackers refers to people who always do their work for good?
✅White-hat

Which of the following ethical hacking stages installs any access mechanism to persist
on a system? ✅Maintaining access

Which type of hacking involves looking for vulnerabilities in a computer or network
system to test a target and ultimately fix them? ✅Ethical

Which teaming is the practice of rigorously challenging plans, policies, systems, and
assumptions by adopting an adversarial approach? ✅Red

Which method identifies the size and scope of the target network? ✅Footprinting

Who among the following hackers are engaged in potentially illegal activities, such as
attacking computer systems for malicious purposes? ✅Black-hat

Which of the following phases of the cyber kill chain model allows the outside server to
communicate with the weapons providing "hands-on keyboard access" inside the
target's network? ✅Command and control

is most important when you embark on an engagement, regardless of
whether you are working on a contract or are a full-time employee. ✅Communication

Which of the following is an act of locating weaknesses and vulnerabilities of
information systems by copying the intent and actions of malicious hackers?
✅Penetration testing

servers are used by attackers to send commands to malware residing on
endpoints. ✅C2

, What is the main purpose of the Rain Forest Puppy Policy (RFP or RFPolicy)?
✅Ensures that the vendors had time to fix issues before announcing them

What do you mean by establishing footholds in the attack lifecycle? ✅Ensuring that the
attackers retain access to the system so they can get back in when they need to

If you were looking for definitive documentation on a protocol, what would you consult?
✅RFC

If you wanted a lightweight protocol to send real-time data over, which of these would
you use? ✅UDP

The protocol data unit (PDU) for the Transmission Control Protocol (TCP) is called a
✅segment

Which of the following refers to a large computer with specialized interfaces acting as
message gateway? ✅IMP

Which of these protocols would be used to communicate with an loT device? ✅HTTP

If you were to see the subnet mask 255.254.0.0, which CIDR notation (prefix) would you
use to indicate the same thing? ✅/15

Which of the following cloud -based service models offers customers a platform on
which they can develop, run, and manage their applications and services? ✅PaaS

Which of these services would be considered as a 'storage as a service" solution?
✅iCloud

The UDP headers contain which of the following fields? ✅Destination port, source port,
checksum, and length

Which network topology are you most likely to run across in a large enterprise network?
✅Star-bus hybrid

Which protocol is necessary to enable the functionality of traceroute? ✅ICMP

Which of the following IP header fields indicates how long a message can live on the
network before it is considered to be expired? ✅TTL

The common format of a MAC address is 6 octets (3-bit bytes) generally separated by
✅colons

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller twishfrancis. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76658 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.49
  • (0)
  Add to cart